Systems And Methods For Protecting Against Relay Attacks

Systems, methods, and devices are disclosed for preventing relay attacks. A user device may receive (e.g., when proximate to the first access device), from an intervening device, device identification data for a first access device. A message may be received from a second access device via the inter...

Full description

Saved in:
Bibliographic Details
Main Authors Aabye, Christian, Flurscheim, Christian, Sullivan, Brian, Chen, Yuexi, Wang, Quan, Hapuarachchi, Pasan
Format Patent
LanguageEnglish
Published 03.08.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Systems, methods, and devices are disclosed for preventing relay attacks. A user device may receive (e.g., when proximate to the first access device), from an intervening device, device identification data for a first access device. A message may be received from a second access device via the intervening device. The message may include a digital signature generated based at least in part on second access device identification data. The user device may validate the message utilizing the digital signature and a public key. If the message is invalid, the user device may discard the message. If the message is valid, (e.g., unaltered), the user device may determine that the user has not confirmed an intent to interact with the second access device and may terminate an further interaction with the second access device accordingly.
Bibliography:Application Number: US202318193438